Технический комитет по стандартизации 
«Криптографическая защита информации» (TK 26)

Программа

Wednesday 3.06

11.30-13.00Free time
13.00-14.00Lunch
14.00-14.30Registration
14.30-14.40Opening remarks
14.40-18.10Mathematical problems of cryptography I
14.40-15.10Andrey Bogdanov. Towards Post-Snowden Cryptography
15.10-15.40Yury Kharin. Parsimonious models of high-order Markov chains for evaluation of cryptographic generators
15.40-16.00N.A. Kolomeec. A graph of minimal distances of bent functions
16.00-16.20V.G. Mihailov, A.V. Volgin. Solutions set stability of pseudo-Boolean equations system in a case of their random distortions
16.20-16.40Coffee break
16.40-17.10Sergey Agievich, Anastasia Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia Tokareva, Valeriya Vitkup. Mathematical problems of the First international student's Olympiad in cryptography NSUCRYPTO
17.10-17.30A.Yu. Nesterenko. Some remarks on elliptic curve discrete logarithm problem
17.30-17.50K. Zhukov. Approximate common divisor problem and continued fractions
17.50-18.05A.R. Gaynullina, S.N.Tronin. On Operad-based Cryptography

 

Thursday 4.06

10.00-11.50Mathematical problems of cryptography II (Session in memory of Alexander Nechaev)
10.00-10.30Alexey Kuzmin. Alexander Nechaev's mathematical heritage
10.30-10.50S.N. Zaitsev. Reconstruction of a skew non-reducible MP LRS over Galois ring of characteristic 2d by a highest digit
10.50-11.10M.A. Goltvanitsa. The first digit sequence of a skew linear recurrence of a maximal period over Galois ring
11.10-11.30V.N. Tsypyshev. Second coordinate sequence of the MP-LRS over non-trivial Galois ring of  odd characteristic
11.30-11.50S. Kuzmin. On binary digit-position sequences over Galois rings, admitting twofold reduction of a period
11.50-12.10Coffee break
12.10-13.55Quantum cryptography and technologies
12.10-12.40Farid Ablayev, Marat Ablayev. On the concept of quantum hashing
12.40-13.00M. Kaplan. Quantum attacks against iterated block ciphers
13.00-13.20I.V. Radchenko, K.S. Kravtsov, S.P. Kulik. Quantum random number generator
13.20-13.40A. Vasiliev, M. Ziatdinov. Minimizing collisions for quantum hashing
13.40-13.55M. Ziatdinov. Quantum hashing based on symmetric groups
13.55-14.55Lunch
14.55-16.10Cryptanalysis and implementation I
14.55-15.10N. P. Borisenko, V. L. Nguyen. On an implementation method of a large size linear transformation
15.10-15.25P.A. Lebedev.   Unifying development and implementation of secure network protocols in C++
15.25-15.40A.V. Trepacheva.  A known plaintext attack on a fully homomorphic cryptosistem based on factorization
15.40-15.55G. Sekar. Side channel cryptanalysis of Streebog
15.55-16.10Ph. B. Burtyka. Additively homomorphic encryption using matrix polynomials with approximate perfect security
16.10-16.30Coffee break

 

Дискуссионная панель
«День открытых дверей ТК26»
(14.55–18.00)

 

Формат дискуссионной панели: выступление спикера 15 мин. + 15 мин. обсуждение темы с аудиторией.

Вопросы к обсуждению:

  • Новый образ ТК26. Текущие проекты. Перспективы развития.

Спикер – Чапчаев А.А., Генеральный директор ОАО  «ИнфоТеКС»

  • О разработке требований к СКЗИ
Спикер – Маршалко Г.Б., представитель ТК 26
  • Международная стандартизация: вчера, сегодня, завтра
Спикер – Уривский А.В., представитель ТК 26
  • Доверенная третья сторона
Спикер – Муругов С.М., генеральный директор ООО «ТОП КРОСС»
  • Применение отечественных криптографических алгоритмов в протоколах расширенного контроля доступа к данным и функциям удостоверение личности гражданина
Спикер – Мелузов Антон Сергеевич, ФГУП НИИ «Восход»

 

Friday 5.06

10.00-11.20Cryptographic mechanisms
10.00-10.30Markku-Yuhani Olavi Saarinen, Developments with CAESAR authenticated encryption competition
10.30-10.50S.V. Polikarpov, K.E. Rumyantsev, A.A. Kozhevnikov. On differential properties of a symmetric crypto algorithm based on  pseudo-dynamic substitutions
10.50-11.05E.K. Alekseev, V.D. Nikolaev, I.B. Oshkin, V.O. Popov, A.S. Prokhorov, S.V. Smyshlyaev, L.A. Soninа. On a secure connection establishment protocol for a functional key carrier
11.05-11.20S.N.Tronin, K.A.Petukhova. RSA-like cryptosystem using Dedekind rings
11.20-11.40Coffee break
11.40-13.00Cryptanalysis and implementation II
11.40-12.00S. Grebnev. Optimizing memory cost of multi-scalar multiplication
12.00-12.20D. Fomin. A timing attack on CUDA implementations of an AES-type block cipher
12.20-12.40R. AlTawy, O. Duman,  A.M. Youssef. Fault Analysis of Kuznyechik
12.40-13.00D.A. Burov, B.A. Pogorelov. Attack on 6 rounds of  KHAZAD
13.00-14.00Check-out
14.00-15.00Lunch